[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v4 0/2] x86/HVM: Properly handle SMAP check in certain cases



>>> On 30.07.14 at 03:35, <feng.wu@xxxxxxxxx> wrote:
> V4:
> - Adjust the branch handling in update_runstate_area().
> - Remove the pointless initial value of smap_check_policy_t.
> - Using __packed__ attribute for smap_check_policy_t to make
> its size down to one byte.
> - Adjust the position of 'smap_check_policy' in struct arch_vcpu
> to use the current padding in this structure.
> - Coding style.
> 
> Feng Wu (2):
>   x86/hvm: Always do SMAP check when updating runstate_guest(v)
>   x86/hvm: Always do SMAP check when updating secondary system time for
>     guest
> 
>  xen/arch/x86/domain.c        | 27 +++++++++++++++++++++++----
>  xen/arch/x86/mm/guest_walk.c | 39 ++++++++++++++++++++++++++-------------
>  xen/arch/x86/time.c          | 10 +++++++++-
>  xen/include/asm-x86/domain.h | 19 +++++++++++++++++--
>  4 files changed, 75 insertions(+), 20 deletions(-)

Sander,

can you confirm this addresses the issue you had?

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.